Across
- 3. Practices to ensure secure and responsible internet use
- 5. A copy of important data stored separately for recovery
- 7. Regular software improvements to fix security vulnerabilities
- 10. Manipulating people to gain confidential information
- 13. Software designed to detect and remove malicious programs
- 14. The process of verifying a user's identity
- 16. When data is accessed or exposed without permission
- 17. A fraudulent attempt to obtain sensitive information
- 18. A person who gains unauthorized access to systems
Down
- 1. A type of malicious software that can infect a computer
- 2. Malicious software designed to harm or exploit systems
- 4. A program that secretly gathers information about a user
- 6. A tool that stores and encrypts login credentials
- 8. Protecting personal information from unauthorized access
- 9. A wireless network that should be secured with a strong password
- 11. When someone illegally uses your personal information
- 12. The process of converting information into a secure code
- 15. An extra layer of security requiring two forms of verification
